CVE-2022-49427

Source
https://cve.org/CVERecord?id=CVE-2022-49427
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49427.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49427
Downstream
Related
Published
2025-02-26T02:12:47.692Z
Modified
2026-04-11T12:44:03.583662Z
Summary
iommu/mediatek: Remove clk_disable in mtk_iommu_remove
Details

In the Linux kernel, the following vulnerability has been resolved:

iommu/mediatek: Remove clkdisable in mtkiommu_remove

After the commit b34ea31fe013 ("iommu/mediatek: Always enable the clk on resume"), the iommu clock is controlled by the runtime callback. thus remove the clk control in the mtkiommuremove.

Otherwise, it will warning like:

echo 14018000.iommu > /sys/bus/platform/drivers/mtk-iommu/unbind

[ 51.413044] ------------[ cut here ]------------ [ 51.413648] vpp0smiiommu already disabled [ 51.414233] WARNING: CPU: 2 PID: 157 at */v5.15-rc1/kernel/mediatek/ drivers/clk/clk.c:952 clkcoredisable+0xb0/0xb8 [ 51.417174] Hardware name: MT8195V/C(ENG) (DT) [ 51.418635] pc : clkcoredisable+0xb0/0xb8 [ 51.419177] lr : clkcoredisable+0xb0/0xb8 ... [ 51.429375] Call trace: [ 51.429694] clkcoredisable+0xb0/0xb8 [ 51.430193] clkcoredisablelock+0x24/0x40 [ 51.430745] clkdisable+0x20/0x30 [ 51.431189] mtkiommuremove+0x58/0x118 [ 51.431705] platformremove+0x28/0x60 [ 51.432197] devicereleasedriverinternal+0x110/0x1f0 [ 51.432873] devicedriverdetach+0x18/0x28 [ 51.433418] unbindstore+0xd4/0x108 [ 51.433886] drvattrstore+0x24/0x38 [ 51.434363] sysfskfwrite+0x40/0x58 [ 51.434843] kernfsfopwriteiter+0x164/0x1e0

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49427.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b34ea31fe013569d42b7e8681ef3f717f77c5b72
Fixed
053465ab20dcd324a43a1811ee98e5721e6a3e65
Fixed
9b3bd97acb4f8954b8a43a5d63ed9050d463b4e1
Fixed
6eaa046c696c83542c56765cdde564d9818ff1fb
Fixed
98df772bdd1c4ce717a26289efea15cbbe4b64ed
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
5cad9e2caa9613fdcd246bd4ebf0ffbec1cba2ca

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49427.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.13.0
Fixed
5.15.46
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.14
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49427.json"